CVE-2026-24002

critical

Description

Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets `GRIST_SANDBOX_FLAVOR` to `pyodide` and opens a malicious document, that document could run arbitrary processes on the server hosting Grist. The problem has been addressed in Grist version 1.7.9 and up, by running pyodide under deno. As a workaround, a user can use the gvisor-based sandbox by setting `GRIST_SANDBOX_FLAVOR` to `gvisor`.

References

https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html

https://support.getgrist.com/self-managed/#how-do-i-sandbox-documents

https://github.com/gristlabs/grist-core/security/advisories/GHSA-7xvx-8pf2-pv5g

Details

Source: Mitre, NVD

Published: 2026-01-22

Updated: 2026-02-17

Named Vulnerability: Cellbreak

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.6

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.00048